diff --git a/docs/pages/desktop-access/active-directory-manual.mdx b/docs/pages/desktop-access/active-directory-manual.mdx index 4be9a17ad9da6..967658f64d6e5 100644 --- a/docs/pages/desktop-access/active-directory-manual.mdx +++ b/docs/pages/desktop-access/active-directory-manual.mdx @@ -31,6 +31,20 @@ This guide requires you to have: - An Active Directory domain, configured for LDAPS (Teleport requires an encrypted LDAP connection). Typically this means installing [AD CS](https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/) + + + +Microsoft's Azure Active Directory (Azure AD) offering does not support the +Kerberos authentication protocol, which is required for Teleport's +certificate-based authentication. + +At this time, Teleport does not support integration with Azure AD, however +Teleport Enterprise customers can access Windows desktops (including those +joined to Azure AD) using local accounts via the process described in [Getting +Started with Desktop Access](./getting-started.mdx). + + + - Access to a Domain Controller (!docs/pages/includes/edition-prereqs-tabs.mdx!) diff --git a/docs/pages/desktop-access/active-directory.mdx b/docs/pages/desktop-access/active-directory.mdx index ce5eca82f6945..6edaeccac3d6f 100644 --- a/docs/pages/desktop-access/active-directory.mdx +++ b/docs/pages/desktop-access/active-directory.mdx @@ -19,6 +19,19 @@ The features documented on this page are available in Teleport `10.2.6` and high This guide will help you configure Teleport and Active Directory in order to provide secure, passwordless access to Windows desktops. + + +Microsoft's Azure Active Directory (Azure AD) offering does not support the +Kerberos authentication protocol, which is required for Teleport's +certificate-based authentication. + +At this time, Teleport does not support integration with Azure AD, however +Teleport Enterprise customers can access Windows desktops (including those +joined to Azure AD) using local accounts via the process described in [Getting +Started with Desktop Access](./getting-started.mdx). + + +
The Teleport Desktop Service is designed to be a secure access solution for Windows @@ -84,7 +97,7 @@ block to a temporary location. Click **Next**. On the Linux host where you will run the Teleport Desktop Service, create a file called `/etc/teleport.yaml` and paste the configuration provided by the output -of the previous step. +of the previous step. @@ -112,19 +125,19 @@ proxy_service: windows_desktop_service: enabled: yes ldap: - addr: '10.10.1.50:636' - domain: 'windows.teleport.example.com' + addr: '10.10.1.50:636' + domain: 'windows.teleport.example.com' username: 'WIN\svc-teleport' server_name: 'windows-server-hostname' # insecure_skip_verify prevents teleport from authenticating the LDAP CA # against the systems trust store. insecure_skip_verify: false ldap_ca_cert: | - -----BEGIN CERTIFICATE----- - MIIDnzCCAoegAwIBAgIQT/UIn+MT4aZC9ix/QuiV9zANBgkqhkiG9w0BAQsFADBi - ... - 31qA4dO3if7RdikD9hVbiIF9jQ== - -----END CERTIFICATE----- + -----BEGIN CERTIFICATE----- + MIIDnzCCAoegAwIBAgIQT/UIn+MT4aZC9ix/QuiV9zANBgkqhkiG9w0BAQsFADBi + ... + 31qA4dO3if7RdikD9hVbiIF9jQ== + -----END CERTIFICATE----- discovery: base_dn: '*'